1 /*
2  * Copyright (C) 2016 Netronome Systems, Inc.
3  *
4  * This software is dual licensed under the GNU General License Version 2,
5  * June 1991 as shown in the file COPYING in the top-level directory of this
6  * source tree or the BSD 2-Clause License provided below.  You have the
7  * option to license this software under the complete terms of either license.
8  *
9  * The BSD 2-Clause License:
10  *
11  *     Redistribution and use in source and binary forms, with or
12  *     without modification, are permitted provided that the following
13  *     conditions are met:
14  *
15  *      1. Redistributions of source code must retain the above
16  *         copyright notice, this list of conditions and the following
17  *         disclaimer.
18  *
19  *      2. Redistributions in binary form must reproduce the above
20  *         copyright notice, this list of conditions and the following
21  *         disclaimer in the documentation and/or other materials
22  *         provided with the distribution.
23  *
24  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
25  * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
26  * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
27  * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
28  * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
29  * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
30  * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
31  * SOFTWARE.
32  */
33 
34 #define pr_fmt(fmt)	"NFP net bpf: " fmt
35 
36 #include <linux/kernel.h>
37 #include <linux/bpf.h>
38 #include <linux/filter.h>
39 #include <linux/pkt_cls.h>
40 #include <linux/unistd.h>
41 
42 #include "main.h"
43 #include "../nfp_asm.h"
44 
45 /* --- NFP prog --- */
46 /* Foreach "multiple" entries macros provide pos and next<n> pointers.
47  * It's safe to modify the next pointers (but not pos).
48  */
49 #define nfp_for_each_insn_walk2(nfp_prog, pos, next)			\
50 	for (pos = list_first_entry(&(nfp_prog)->insns, typeof(*pos), l), \
51 	     next = list_next_entry(pos, l);			\
52 	     &(nfp_prog)->insns != &pos->l &&			\
53 	     &(nfp_prog)->insns != &next->l;			\
54 	     pos = nfp_meta_next(pos),				\
55 	     next = nfp_meta_next(pos))
56 
57 #define nfp_for_each_insn_walk3(nfp_prog, pos, next, next2)		\
58 	for (pos = list_first_entry(&(nfp_prog)->insns, typeof(*pos), l), \
59 	     next = list_next_entry(pos, l),			\
60 	     next2 = list_next_entry(next, l);			\
61 	     &(nfp_prog)->insns != &pos->l &&			\
62 	     &(nfp_prog)->insns != &next->l &&			\
63 	     &(nfp_prog)->insns != &next2->l;			\
64 	     pos = nfp_meta_next(pos),				\
65 	     next = nfp_meta_next(pos),				\
66 	     next2 = nfp_meta_next(next))
67 
68 static bool
69 nfp_meta_has_next(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
70 {
71 	return meta->l.next != &nfp_prog->insns;
72 }
73 
74 static bool
75 nfp_meta_has_prev(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
76 {
77 	return meta->l.prev != &nfp_prog->insns;
78 }
79 
80 static void nfp_prog_free(struct nfp_prog *nfp_prog)
81 {
82 	struct nfp_insn_meta *meta, *tmp;
83 
84 	list_for_each_entry_safe(meta, tmp, &nfp_prog->insns, l) {
85 		list_del(&meta->l);
86 		kfree(meta);
87 	}
88 	kfree(nfp_prog);
89 }
90 
91 static void nfp_prog_push(struct nfp_prog *nfp_prog, u64 insn)
92 {
93 	if (nfp_prog->__prog_alloc_len == nfp_prog->prog_len) {
94 		nfp_prog->error = -ENOSPC;
95 		return;
96 	}
97 
98 	nfp_prog->prog[nfp_prog->prog_len] = insn;
99 	nfp_prog->prog_len++;
100 }
101 
102 static unsigned int nfp_prog_current_offset(struct nfp_prog *nfp_prog)
103 {
104 	return nfp_prog->start_off + nfp_prog->prog_len;
105 }
106 
107 static unsigned int
108 nfp_prog_offset_to_index(struct nfp_prog *nfp_prog, unsigned int offset)
109 {
110 	return offset - nfp_prog->start_off;
111 }
112 
113 /* --- Emitters --- */
114 static void
115 __emit_cmd(struct nfp_prog *nfp_prog, enum cmd_tgt_map op,
116 	   u8 mode, u8 xfer, u8 areg, u8 breg, u8 size, bool sync)
117 {
118 	enum cmd_ctx_swap ctx;
119 	u64 insn;
120 
121 	if (sync)
122 		ctx = CMD_CTX_SWAP;
123 	else
124 		ctx = CMD_CTX_NO_SWAP;
125 
126 	insn =	FIELD_PREP(OP_CMD_A_SRC, areg) |
127 		FIELD_PREP(OP_CMD_CTX, ctx) |
128 		FIELD_PREP(OP_CMD_B_SRC, breg) |
129 		FIELD_PREP(OP_CMD_TOKEN, cmd_tgt_act[op].token) |
130 		FIELD_PREP(OP_CMD_XFER, xfer) |
131 		FIELD_PREP(OP_CMD_CNT, size) |
132 		FIELD_PREP(OP_CMD_SIG, sync) |
133 		FIELD_PREP(OP_CMD_TGT_CMD, cmd_tgt_act[op].tgt_cmd) |
134 		FIELD_PREP(OP_CMD_MODE, mode);
135 
136 	nfp_prog_push(nfp_prog, insn);
137 }
138 
139 static void
140 emit_cmd(struct nfp_prog *nfp_prog, enum cmd_tgt_map op,
141 	 u8 mode, u8 xfer, swreg lreg, swreg rreg, u8 size, bool sync)
142 {
143 	struct nfp_insn_re_regs reg;
144 	int err;
145 
146 	err = swreg_to_restricted(reg_none(), lreg, rreg, &reg, false);
147 	if (err) {
148 		nfp_prog->error = err;
149 		return;
150 	}
151 	if (reg.swap) {
152 		pr_err("cmd can't swap arguments\n");
153 		nfp_prog->error = -EFAULT;
154 		return;
155 	}
156 	if (reg.dst_lmextn || reg.src_lmextn) {
157 		pr_err("cmd can't use LMextn\n");
158 		nfp_prog->error = -EFAULT;
159 		return;
160 	}
161 
162 	__emit_cmd(nfp_prog, op, mode, xfer, reg.areg, reg.breg, size, sync);
163 }
164 
165 static void
166 __emit_br(struct nfp_prog *nfp_prog, enum br_mask mask, enum br_ev_pip ev_pip,
167 	  enum br_ctx_signal_state css, u16 addr, u8 defer)
168 {
169 	u16 addr_lo, addr_hi;
170 	u64 insn;
171 
172 	addr_lo = addr & (OP_BR_ADDR_LO >> __bf_shf(OP_BR_ADDR_LO));
173 	addr_hi = addr != addr_lo;
174 
175 	insn = OP_BR_BASE |
176 		FIELD_PREP(OP_BR_MASK, mask) |
177 		FIELD_PREP(OP_BR_EV_PIP, ev_pip) |
178 		FIELD_PREP(OP_BR_CSS, css) |
179 		FIELD_PREP(OP_BR_DEFBR, defer) |
180 		FIELD_PREP(OP_BR_ADDR_LO, addr_lo) |
181 		FIELD_PREP(OP_BR_ADDR_HI, addr_hi);
182 
183 	nfp_prog_push(nfp_prog, insn);
184 }
185 
186 static void emit_br_def(struct nfp_prog *nfp_prog, u16 addr, u8 defer)
187 {
188 	if (defer > 2) {
189 		pr_err("BUG: branch defer out of bounds %d\n", defer);
190 		nfp_prog->error = -EFAULT;
191 		return;
192 	}
193 	__emit_br(nfp_prog, BR_UNC, BR_EV_PIP_UNCOND, BR_CSS_NONE, addr, defer);
194 }
195 
196 static void
197 emit_br(struct nfp_prog *nfp_prog, enum br_mask mask, u16 addr, u8 defer)
198 {
199 	__emit_br(nfp_prog, mask,
200 		  mask != BR_UNC ? BR_EV_PIP_COND : BR_EV_PIP_UNCOND,
201 		  BR_CSS_NONE, addr, defer);
202 }
203 
204 static void
205 __emit_br_byte(struct nfp_prog *nfp_prog, u8 areg, u8 breg, bool imm8,
206 	       u8 byte, bool equal, u16 addr, u8 defer, bool src_lmextn)
207 {
208 	u16 addr_lo, addr_hi;
209 	u64 insn;
210 
211 	addr_lo = addr & (OP_BB_ADDR_LO >> __bf_shf(OP_BB_ADDR_LO));
212 	addr_hi = addr != addr_lo;
213 
214 	insn = OP_BBYTE_BASE |
215 		FIELD_PREP(OP_BB_A_SRC, areg) |
216 		FIELD_PREP(OP_BB_BYTE, byte) |
217 		FIELD_PREP(OP_BB_B_SRC, breg) |
218 		FIELD_PREP(OP_BB_I8, imm8) |
219 		FIELD_PREP(OP_BB_EQ, equal) |
220 		FIELD_PREP(OP_BB_DEFBR, defer) |
221 		FIELD_PREP(OP_BB_ADDR_LO, addr_lo) |
222 		FIELD_PREP(OP_BB_ADDR_HI, addr_hi) |
223 		FIELD_PREP(OP_BB_SRC_LMEXTN, src_lmextn);
224 
225 	nfp_prog_push(nfp_prog, insn);
226 }
227 
228 static void
229 emit_br_byte_neq(struct nfp_prog *nfp_prog,
230 		 swreg src, u8 imm, u8 byte, u16 addr, u8 defer)
231 {
232 	struct nfp_insn_re_regs reg;
233 	int err;
234 
235 	err = swreg_to_restricted(reg_none(), src, reg_imm(imm), &reg, true);
236 	if (err) {
237 		nfp_prog->error = err;
238 		return;
239 	}
240 
241 	__emit_br_byte(nfp_prog, reg.areg, reg.breg, reg.i8, byte, false, addr,
242 		       defer, reg.src_lmextn);
243 }
244 
245 static void
246 __emit_immed(struct nfp_prog *nfp_prog, u16 areg, u16 breg, u16 imm_hi,
247 	     enum immed_width width, bool invert,
248 	     enum immed_shift shift, bool wr_both,
249 	     bool dst_lmextn, bool src_lmextn)
250 {
251 	u64 insn;
252 
253 	insn = OP_IMMED_BASE |
254 		FIELD_PREP(OP_IMMED_A_SRC, areg) |
255 		FIELD_PREP(OP_IMMED_B_SRC, breg) |
256 		FIELD_PREP(OP_IMMED_IMM, imm_hi) |
257 		FIELD_PREP(OP_IMMED_WIDTH, width) |
258 		FIELD_PREP(OP_IMMED_INV, invert) |
259 		FIELD_PREP(OP_IMMED_SHIFT, shift) |
260 		FIELD_PREP(OP_IMMED_WR_AB, wr_both) |
261 		FIELD_PREP(OP_IMMED_SRC_LMEXTN, src_lmextn) |
262 		FIELD_PREP(OP_IMMED_DST_LMEXTN, dst_lmextn);
263 
264 	nfp_prog_push(nfp_prog, insn);
265 }
266 
267 static void
268 emit_immed(struct nfp_prog *nfp_prog, swreg dst, u16 imm,
269 	   enum immed_width width, bool invert, enum immed_shift shift)
270 {
271 	struct nfp_insn_ur_regs reg;
272 	int err;
273 
274 	if (swreg_type(dst) == NN_REG_IMM) {
275 		nfp_prog->error = -EFAULT;
276 		return;
277 	}
278 
279 	err = swreg_to_unrestricted(dst, dst, reg_imm(imm & 0xff), &reg);
280 	if (err) {
281 		nfp_prog->error = err;
282 		return;
283 	}
284 
285 	__emit_immed(nfp_prog, reg.areg, reg.breg, imm >> 8, width,
286 		     invert, shift, reg.wr_both,
287 		     reg.dst_lmextn, reg.src_lmextn);
288 }
289 
290 static void
291 __emit_shf(struct nfp_prog *nfp_prog, u16 dst, enum alu_dst_ab dst_ab,
292 	   enum shf_sc sc, u8 shift,
293 	   u16 areg, enum shf_op op, u16 breg, bool i8, bool sw, bool wr_both,
294 	   bool dst_lmextn, bool src_lmextn)
295 {
296 	u64 insn;
297 
298 	if (!FIELD_FIT(OP_SHF_SHIFT, shift)) {
299 		nfp_prog->error = -EFAULT;
300 		return;
301 	}
302 
303 	if (sc == SHF_SC_L_SHF)
304 		shift = 32 - shift;
305 
306 	insn = OP_SHF_BASE |
307 		FIELD_PREP(OP_SHF_A_SRC, areg) |
308 		FIELD_PREP(OP_SHF_SC, sc) |
309 		FIELD_PREP(OP_SHF_B_SRC, breg) |
310 		FIELD_PREP(OP_SHF_I8, i8) |
311 		FIELD_PREP(OP_SHF_SW, sw) |
312 		FIELD_PREP(OP_SHF_DST, dst) |
313 		FIELD_PREP(OP_SHF_SHIFT, shift) |
314 		FIELD_PREP(OP_SHF_OP, op) |
315 		FIELD_PREP(OP_SHF_DST_AB, dst_ab) |
316 		FIELD_PREP(OP_SHF_WR_AB, wr_both) |
317 		FIELD_PREP(OP_SHF_SRC_LMEXTN, src_lmextn) |
318 		FIELD_PREP(OP_SHF_DST_LMEXTN, dst_lmextn);
319 
320 	nfp_prog_push(nfp_prog, insn);
321 }
322 
323 static void
324 emit_shf(struct nfp_prog *nfp_prog, swreg dst,
325 	 swreg lreg, enum shf_op op, swreg rreg, enum shf_sc sc, u8 shift)
326 {
327 	struct nfp_insn_re_regs reg;
328 	int err;
329 
330 	err = swreg_to_restricted(dst, lreg, rreg, &reg, true);
331 	if (err) {
332 		nfp_prog->error = err;
333 		return;
334 	}
335 
336 	__emit_shf(nfp_prog, reg.dst, reg.dst_ab, sc, shift,
337 		   reg.areg, op, reg.breg, reg.i8, reg.swap, reg.wr_both,
338 		   reg.dst_lmextn, reg.src_lmextn);
339 }
340 
341 static void
342 __emit_alu(struct nfp_prog *nfp_prog, u16 dst, enum alu_dst_ab dst_ab,
343 	   u16 areg, enum alu_op op, u16 breg, bool swap, bool wr_both,
344 	   bool dst_lmextn, bool src_lmextn)
345 {
346 	u64 insn;
347 
348 	insn = OP_ALU_BASE |
349 		FIELD_PREP(OP_ALU_A_SRC, areg) |
350 		FIELD_PREP(OP_ALU_B_SRC, breg) |
351 		FIELD_PREP(OP_ALU_DST, dst) |
352 		FIELD_PREP(OP_ALU_SW, swap) |
353 		FIELD_PREP(OP_ALU_OP, op) |
354 		FIELD_PREP(OP_ALU_DST_AB, dst_ab) |
355 		FIELD_PREP(OP_ALU_WR_AB, wr_both) |
356 		FIELD_PREP(OP_ALU_SRC_LMEXTN, src_lmextn) |
357 		FIELD_PREP(OP_ALU_DST_LMEXTN, dst_lmextn);
358 
359 	nfp_prog_push(nfp_prog, insn);
360 }
361 
362 static void
363 emit_alu(struct nfp_prog *nfp_prog, swreg dst,
364 	 swreg lreg, enum alu_op op, swreg rreg)
365 {
366 	struct nfp_insn_ur_regs reg;
367 	int err;
368 
369 	err = swreg_to_unrestricted(dst, lreg, rreg, &reg);
370 	if (err) {
371 		nfp_prog->error = err;
372 		return;
373 	}
374 
375 	__emit_alu(nfp_prog, reg.dst, reg.dst_ab,
376 		   reg.areg, op, reg.breg, reg.swap, reg.wr_both,
377 		   reg.dst_lmextn, reg.src_lmextn);
378 }
379 
380 static void
381 __emit_ld_field(struct nfp_prog *nfp_prog, enum shf_sc sc,
382 		u8 areg, u8 bmask, u8 breg, u8 shift, bool imm8,
383 		bool zero, bool swap, bool wr_both,
384 		bool dst_lmextn, bool src_lmextn)
385 {
386 	u64 insn;
387 
388 	insn = OP_LDF_BASE |
389 		FIELD_PREP(OP_LDF_A_SRC, areg) |
390 		FIELD_PREP(OP_LDF_SC, sc) |
391 		FIELD_PREP(OP_LDF_B_SRC, breg) |
392 		FIELD_PREP(OP_LDF_I8, imm8) |
393 		FIELD_PREP(OP_LDF_SW, swap) |
394 		FIELD_PREP(OP_LDF_ZF, zero) |
395 		FIELD_PREP(OP_LDF_BMASK, bmask) |
396 		FIELD_PREP(OP_LDF_SHF, shift) |
397 		FIELD_PREP(OP_LDF_WR_AB, wr_both) |
398 		FIELD_PREP(OP_LDF_SRC_LMEXTN, src_lmextn) |
399 		FIELD_PREP(OP_LDF_DST_LMEXTN, dst_lmextn);
400 
401 	nfp_prog_push(nfp_prog, insn);
402 }
403 
404 static void
405 emit_ld_field_any(struct nfp_prog *nfp_prog, swreg dst, u8 bmask, swreg src,
406 		  enum shf_sc sc, u8 shift, bool zero)
407 {
408 	struct nfp_insn_re_regs reg;
409 	int err;
410 
411 	/* Note: ld_field is special as it uses one of the src regs as dst */
412 	err = swreg_to_restricted(dst, dst, src, &reg, true);
413 	if (err) {
414 		nfp_prog->error = err;
415 		return;
416 	}
417 
418 	__emit_ld_field(nfp_prog, sc, reg.areg, bmask, reg.breg, shift,
419 			reg.i8, zero, reg.swap, reg.wr_both,
420 			reg.dst_lmextn, reg.src_lmextn);
421 }
422 
423 static void
424 emit_ld_field(struct nfp_prog *nfp_prog, swreg dst, u8 bmask, swreg src,
425 	      enum shf_sc sc, u8 shift)
426 {
427 	emit_ld_field_any(nfp_prog, dst, bmask, src, sc, shift, false);
428 }
429 
430 static void emit_nop(struct nfp_prog *nfp_prog)
431 {
432 	__emit_immed(nfp_prog, UR_REG_IMM, UR_REG_IMM, 0, 0, 0, 0, 0, 0, 0);
433 }
434 
435 /* --- Wrappers --- */
436 static bool pack_immed(u32 imm, u16 *val, enum immed_shift *shift)
437 {
438 	if (!(imm & 0xffff0000)) {
439 		*val = imm;
440 		*shift = IMMED_SHIFT_0B;
441 	} else if (!(imm & 0xff0000ff)) {
442 		*val = imm >> 8;
443 		*shift = IMMED_SHIFT_1B;
444 	} else if (!(imm & 0x0000ffff)) {
445 		*val = imm >> 16;
446 		*shift = IMMED_SHIFT_2B;
447 	} else {
448 		return false;
449 	}
450 
451 	return true;
452 }
453 
454 static void wrp_immed(struct nfp_prog *nfp_prog, swreg dst, u32 imm)
455 {
456 	enum immed_shift shift;
457 	u16 val;
458 
459 	if (pack_immed(imm, &val, &shift)) {
460 		emit_immed(nfp_prog, dst, val, IMMED_WIDTH_ALL, false, shift);
461 	} else if (pack_immed(~imm, &val, &shift)) {
462 		emit_immed(nfp_prog, dst, val, IMMED_WIDTH_ALL, true, shift);
463 	} else {
464 		emit_immed(nfp_prog, dst, imm & 0xffff, IMMED_WIDTH_ALL,
465 			   false, IMMED_SHIFT_0B);
466 		emit_immed(nfp_prog, dst, imm >> 16, IMMED_WIDTH_WORD,
467 			   false, IMMED_SHIFT_2B);
468 	}
469 }
470 
471 /* ur_load_imm_any() - encode immediate or use tmp register (unrestricted)
472  * If the @imm is small enough encode it directly in operand and return
473  * otherwise load @imm to a spare register and return its encoding.
474  */
475 static swreg ur_load_imm_any(struct nfp_prog *nfp_prog, u32 imm, swreg tmp_reg)
476 {
477 	if (FIELD_FIT(UR_REG_IMM_MAX, imm))
478 		return reg_imm(imm);
479 
480 	wrp_immed(nfp_prog, tmp_reg, imm);
481 	return tmp_reg;
482 }
483 
484 /* re_load_imm_any() - encode immediate or use tmp register (restricted)
485  * If the @imm is small enough encode it directly in operand and return
486  * otherwise load @imm to a spare register and return its encoding.
487  */
488 static swreg re_load_imm_any(struct nfp_prog *nfp_prog, u32 imm, swreg tmp_reg)
489 {
490 	if (FIELD_FIT(RE_REG_IMM_MAX, imm))
491 		return reg_imm(imm);
492 
493 	wrp_immed(nfp_prog, tmp_reg, imm);
494 	return tmp_reg;
495 }
496 
497 static void
498 wrp_br_special(struct nfp_prog *nfp_prog, enum br_mask mask,
499 	       enum br_special special)
500 {
501 	emit_br(nfp_prog, mask, 0, 0);
502 
503 	nfp_prog->prog[nfp_prog->prog_len - 1] |=
504 		FIELD_PREP(OP_BR_SPECIAL, special);
505 }
506 
507 static void wrp_mov(struct nfp_prog *nfp_prog, swreg dst, swreg src)
508 {
509 	emit_alu(nfp_prog, dst, reg_none(), ALU_OP_NONE, src);
510 }
511 
512 static void wrp_reg_mov(struct nfp_prog *nfp_prog, u16 dst, u16 src)
513 {
514 	wrp_mov(nfp_prog, reg_both(dst), reg_b(src));
515 }
516 
517 static int
518 data_ld(struct nfp_prog *nfp_prog, swreg offset, u8 dst_gpr, int size)
519 {
520 	unsigned int i;
521 	u16 shift, sz;
522 
523 	/* We load the value from the address indicated in @offset and then
524 	 * shift out the data we don't need.  Note: this is big endian!
525 	 */
526 	sz = max(size, 4);
527 	shift = size < 4 ? 4 - size : 0;
528 
529 	emit_cmd(nfp_prog, CMD_TGT_READ8, CMD_MODE_32b, 0,
530 		 pptr_reg(nfp_prog), offset, sz - 1, true);
531 
532 	i = 0;
533 	if (shift)
534 		emit_shf(nfp_prog, reg_both(dst_gpr), reg_none(), SHF_OP_NONE,
535 			 reg_xfer(0), SHF_SC_R_SHF, shift * 8);
536 	else
537 		for (; i * 4 < size; i++)
538 			wrp_mov(nfp_prog, reg_both(dst_gpr + i), reg_xfer(i));
539 
540 	if (i < 2)
541 		wrp_immed(nfp_prog, reg_both(dst_gpr + 1), 0);
542 
543 	return 0;
544 }
545 
546 static int
547 data_ld_host_order(struct nfp_prog *nfp_prog, u8 src_gpr, swreg offset,
548 		   u8 dst_gpr, int size)
549 {
550 	unsigned int i;
551 	u8 mask, sz;
552 
553 	/* We load the value from the address indicated in @offset and then
554 	 * mask out the data we don't need.  Note: this is little endian!
555 	 */
556 	sz = max(size, 4);
557 	mask = size < 4 ? GENMASK(size - 1, 0) : 0;
558 
559 	emit_cmd(nfp_prog, CMD_TGT_READ32_SWAP, CMD_MODE_32b, 0,
560 		 reg_a(src_gpr), offset, sz / 4 - 1, true);
561 
562 	i = 0;
563 	if (mask)
564 		emit_ld_field_any(nfp_prog, reg_both(dst_gpr), mask,
565 				  reg_xfer(0), SHF_SC_NONE, 0, true);
566 	else
567 		for (; i * 4 < size; i++)
568 			wrp_mov(nfp_prog, reg_both(dst_gpr + i), reg_xfer(i));
569 
570 	if (i < 2)
571 		wrp_immed(nfp_prog, reg_both(dst_gpr + 1), 0);
572 
573 	return 0;
574 }
575 
576 static int
577 construct_data_ind_ld(struct nfp_prog *nfp_prog, u16 offset, u16 src, u8 size)
578 {
579 	swreg tmp_reg;
580 
581 	/* Calculate the true offset (src_reg + imm) */
582 	tmp_reg = ur_load_imm_any(nfp_prog, offset, imm_b(nfp_prog));
583 	emit_alu(nfp_prog, imm_both(nfp_prog), reg_a(src), ALU_OP_ADD, tmp_reg);
584 
585 	/* Check packet length (size guaranteed to fit b/c it's u8) */
586 	emit_alu(nfp_prog, imm_a(nfp_prog),
587 		 imm_a(nfp_prog), ALU_OP_ADD, reg_imm(size));
588 	emit_alu(nfp_prog, reg_none(),
589 		 plen_reg(nfp_prog), ALU_OP_SUB, imm_a(nfp_prog));
590 	wrp_br_special(nfp_prog, BR_BLO, OP_BR_GO_ABORT);
591 
592 	/* Load data */
593 	return data_ld(nfp_prog, imm_b(nfp_prog), 0, size);
594 }
595 
596 static int construct_data_ld(struct nfp_prog *nfp_prog, u16 offset, u8 size)
597 {
598 	swreg tmp_reg;
599 
600 	/* Check packet length */
601 	tmp_reg = ur_load_imm_any(nfp_prog, offset + size, imm_a(nfp_prog));
602 	emit_alu(nfp_prog, reg_none(), plen_reg(nfp_prog), ALU_OP_SUB, tmp_reg);
603 	wrp_br_special(nfp_prog, BR_BLO, OP_BR_GO_ABORT);
604 
605 	/* Load data */
606 	tmp_reg = re_load_imm_any(nfp_prog, offset, imm_b(nfp_prog));
607 	return data_ld(nfp_prog, tmp_reg, 0, size);
608 }
609 
610 static int
611 data_stx_host_order(struct nfp_prog *nfp_prog, u8 dst_gpr, swreg offset,
612 		    u8 src_gpr, u8 size)
613 {
614 	unsigned int i;
615 
616 	for (i = 0; i * 4 < size; i++)
617 		wrp_mov(nfp_prog, reg_xfer(i), reg_a(src_gpr + i));
618 
619 	emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 0,
620 		 reg_a(dst_gpr), offset, size - 1, true);
621 
622 	return 0;
623 }
624 
625 static int
626 data_st_host_order(struct nfp_prog *nfp_prog, u8 dst_gpr, swreg offset,
627 		   u64 imm, u8 size)
628 {
629 	wrp_immed(nfp_prog, reg_xfer(0), imm);
630 	if (size == 8)
631 		wrp_immed(nfp_prog, reg_xfer(1), imm >> 32);
632 
633 	emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 0,
634 		 reg_a(dst_gpr), offset, size - 1, true);
635 
636 	return 0;
637 }
638 
639 static void
640 wrp_alu_imm(struct nfp_prog *nfp_prog, u8 dst, enum alu_op alu_op, u32 imm)
641 {
642 	swreg tmp_reg;
643 
644 	if (alu_op == ALU_OP_AND) {
645 		if (!imm)
646 			wrp_immed(nfp_prog, reg_both(dst), 0);
647 		if (!imm || !~imm)
648 			return;
649 	}
650 	if (alu_op == ALU_OP_OR) {
651 		if (!~imm)
652 			wrp_immed(nfp_prog, reg_both(dst), ~0U);
653 		if (!imm || !~imm)
654 			return;
655 	}
656 	if (alu_op == ALU_OP_XOR) {
657 		if (!~imm)
658 			emit_alu(nfp_prog, reg_both(dst), reg_none(),
659 				 ALU_OP_NEG, reg_b(dst));
660 		if (!imm || !~imm)
661 			return;
662 	}
663 
664 	tmp_reg = ur_load_imm_any(nfp_prog, imm, imm_b(nfp_prog));
665 	emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, tmp_reg);
666 }
667 
668 static int
669 wrp_alu64_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
670 	      enum alu_op alu_op, bool skip)
671 {
672 	const struct bpf_insn *insn = &meta->insn;
673 	u64 imm = insn->imm; /* sign extend */
674 
675 	if (skip) {
676 		meta->skip = true;
677 		return 0;
678 	}
679 
680 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2, alu_op, imm & ~0U);
681 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, alu_op, imm >> 32);
682 
683 	return 0;
684 }
685 
686 static int
687 wrp_alu64_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
688 	      enum alu_op alu_op)
689 {
690 	u8 dst = meta->insn.dst_reg * 2, src = meta->insn.src_reg * 2;
691 
692 	emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, reg_b(src));
693 	emit_alu(nfp_prog, reg_both(dst + 1),
694 		 reg_a(dst + 1), alu_op, reg_b(src + 1));
695 
696 	return 0;
697 }
698 
699 static int
700 wrp_alu32_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
701 	      enum alu_op alu_op, bool skip)
702 {
703 	const struct bpf_insn *insn = &meta->insn;
704 
705 	if (skip) {
706 		meta->skip = true;
707 		return 0;
708 	}
709 
710 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2, alu_op, insn->imm);
711 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
712 
713 	return 0;
714 }
715 
716 static int
717 wrp_alu32_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
718 	      enum alu_op alu_op)
719 {
720 	u8 dst = meta->insn.dst_reg * 2, src = meta->insn.src_reg * 2;
721 
722 	emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, reg_b(src));
723 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
724 
725 	return 0;
726 }
727 
728 static void
729 wrp_test_reg_one(struct nfp_prog *nfp_prog, u8 dst, enum alu_op alu_op, u8 src,
730 		 enum br_mask br_mask, u16 off)
731 {
732 	emit_alu(nfp_prog, reg_none(), reg_a(dst), alu_op, reg_b(src));
733 	emit_br(nfp_prog, br_mask, off, 0);
734 }
735 
736 static int
737 wrp_test_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
738 	     enum alu_op alu_op, enum br_mask br_mask)
739 {
740 	const struct bpf_insn *insn = &meta->insn;
741 
742 	if (insn->off < 0) /* TODO */
743 		return -EOPNOTSUPP;
744 
745 	wrp_test_reg_one(nfp_prog, insn->dst_reg * 2, alu_op,
746 			 insn->src_reg * 2, br_mask, insn->off);
747 	wrp_test_reg_one(nfp_prog, insn->dst_reg * 2 + 1, alu_op,
748 			 insn->src_reg * 2 + 1, br_mask, insn->off);
749 
750 	return 0;
751 }
752 
753 static int
754 wrp_cmp_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
755 	    enum br_mask br_mask, bool swap)
756 {
757 	const struct bpf_insn *insn = &meta->insn;
758 	u64 imm = insn->imm; /* sign extend */
759 	u8 reg = insn->dst_reg * 2;
760 	swreg tmp_reg;
761 
762 	if (insn->off < 0) /* TODO */
763 		return -EOPNOTSUPP;
764 
765 	tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
766 	if (!swap)
767 		emit_alu(nfp_prog, reg_none(), reg_a(reg), ALU_OP_SUB, tmp_reg);
768 	else
769 		emit_alu(nfp_prog, reg_none(), tmp_reg, ALU_OP_SUB, reg_a(reg));
770 
771 	tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
772 	if (!swap)
773 		emit_alu(nfp_prog, reg_none(),
774 			 reg_a(reg + 1), ALU_OP_SUB_C, tmp_reg);
775 	else
776 		emit_alu(nfp_prog, reg_none(),
777 			 tmp_reg, ALU_OP_SUB_C, reg_a(reg + 1));
778 
779 	emit_br(nfp_prog, br_mask, insn->off, 0);
780 
781 	return 0;
782 }
783 
784 static int
785 wrp_cmp_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
786 	    enum br_mask br_mask, bool swap)
787 {
788 	const struct bpf_insn *insn = &meta->insn;
789 	u8 areg, breg;
790 
791 	areg = insn->dst_reg * 2;
792 	breg = insn->src_reg * 2;
793 
794 	if (insn->off < 0) /* TODO */
795 		return -EOPNOTSUPP;
796 
797 	if (swap) {
798 		areg ^= breg;
799 		breg ^= areg;
800 		areg ^= breg;
801 	}
802 
803 	emit_alu(nfp_prog, reg_none(), reg_a(areg), ALU_OP_SUB, reg_b(breg));
804 	emit_alu(nfp_prog, reg_none(),
805 		 reg_a(areg + 1), ALU_OP_SUB_C, reg_b(breg + 1));
806 	emit_br(nfp_prog, br_mask, insn->off, 0);
807 
808 	return 0;
809 }
810 
811 static void wrp_end32(struct nfp_prog *nfp_prog, swreg reg_in, u8 gpr_out)
812 {
813 	emit_ld_field(nfp_prog, reg_both(gpr_out), 0xf, reg_in,
814 		      SHF_SC_R_ROT, 8);
815 	emit_ld_field(nfp_prog, reg_both(gpr_out), 0x5, reg_a(gpr_out),
816 		      SHF_SC_R_ROT, 16);
817 }
818 
819 /* --- Callbacks --- */
820 static int mov_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
821 {
822 	const struct bpf_insn *insn = &meta->insn;
823 
824 	wrp_reg_mov(nfp_prog, insn->dst_reg * 2, insn->src_reg * 2);
825 	wrp_reg_mov(nfp_prog, insn->dst_reg * 2 + 1, insn->src_reg * 2 + 1);
826 
827 	return 0;
828 }
829 
830 static int mov_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
831 {
832 	u64 imm = meta->insn.imm; /* sign extend */
833 
834 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2), imm & ~0U);
835 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), imm >> 32);
836 
837 	return 0;
838 }
839 
840 static int xor_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
841 {
842 	return wrp_alu64_reg(nfp_prog, meta, ALU_OP_XOR);
843 }
844 
845 static int xor_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
846 {
847 	return wrp_alu64_imm(nfp_prog, meta, ALU_OP_XOR, !meta->insn.imm);
848 }
849 
850 static int and_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
851 {
852 	return wrp_alu64_reg(nfp_prog, meta, ALU_OP_AND);
853 }
854 
855 static int and_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
856 {
857 	return wrp_alu64_imm(nfp_prog, meta, ALU_OP_AND, !~meta->insn.imm);
858 }
859 
860 static int or_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
861 {
862 	return wrp_alu64_reg(nfp_prog, meta, ALU_OP_OR);
863 }
864 
865 static int or_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
866 {
867 	return wrp_alu64_imm(nfp_prog, meta, ALU_OP_OR, !meta->insn.imm);
868 }
869 
870 static int add_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
871 {
872 	const struct bpf_insn *insn = &meta->insn;
873 
874 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2),
875 		 reg_a(insn->dst_reg * 2), ALU_OP_ADD,
876 		 reg_b(insn->src_reg * 2));
877 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1),
878 		 reg_a(insn->dst_reg * 2 + 1), ALU_OP_ADD_C,
879 		 reg_b(insn->src_reg * 2 + 1));
880 
881 	return 0;
882 }
883 
884 static int add_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
885 {
886 	const struct bpf_insn *insn = &meta->insn;
887 	u64 imm = insn->imm; /* sign extend */
888 
889 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2, ALU_OP_ADD, imm & ~0U);
890 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, ALU_OP_ADD_C, imm >> 32);
891 
892 	return 0;
893 }
894 
895 static int sub_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
896 {
897 	const struct bpf_insn *insn = &meta->insn;
898 
899 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2),
900 		 reg_a(insn->dst_reg * 2), ALU_OP_SUB,
901 		 reg_b(insn->src_reg * 2));
902 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1),
903 		 reg_a(insn->dst_reg * 2 + 1), ALU_OP_SUB_C,
904 		 reg_b(insn->src_reg * 2 + 1));
905 
906 	return 0;
907 }
908 
909 static int sub_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
910 {
911 	const struct bpf_insn *insn = &meta->insn;
912 	u64 imm = insn->imm; /* sign extend */
913 
914 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2, ALU_OP_SUB, imm & ~0U);
915 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, ALU_OP_SUB_C, imm >> 32);
916 
917 	return 0;
918 }
919 
920 static int shl_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
921 {
922 	const struct bpf_insn *insn = &meta->insn;
923 	u8 dst = insn->dst_reg * 2;
924 
925 	if (insn->imm < 32) {
926 		emit_shf(nfp_prog, reg_both(dst + 1),
927 			 reg_a(dst + 1), SHF_OP_NONE, reg_b(dst),
928 			 SHF_SC_R_DSHF, 32 - insn->imm);
929 		emit_shf(nfp_prog, reg_both(dst),
930 			 reg_none(), SHF_OP_NONE, reg_b(dst),
931 			 SHF_SC_L_SHF, insn->imm);
932 	} else if (insn->imm == 32) {
933 		wrp_reg_mov(nfp_prog, dst + 1, dst);
934 		wrp_immed(nfp_prog, reg_both(dst), 0);
935 	} else if (insn->imm > 32) {
936 		emit_shf(nfp_prog, reg_both(dst + 1),
937 			 reg_none(), SHF_OP_NONE, reg_b(dst),
938 			 SHF_SC_L_SHF, insn->imm - 32);
939 		wrp_immed(nfp_prog, reg_both(dst), 0);
940 	}
941 
942 	return 0;
943 }
944 
945 static int shr_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
946 {
947 	const struct bpf_insn *insn = &meta->insn;
948 	u8 dst = insn->dst_reg * 2;
949 
950 	if (insn->imm < 32) {
951 		emit_shf(nfp_prog, reg_both(dst),
952 			 reg_a(dst + 1), SHF_OP_NONE, reg_b(dst),
953 			 SHF_SC_R_DSHF, insn->imm);
954 		emit_shf(nfp_prog, reg_both(dst + 1),
955 			 reg_none(), SHF_OP_NONE, reg_b(dst + 1),
956 			 SHF_SC_R_SHF, insn->imm);
957 	} else if (insn->imm == 32) {
958 		wrp_reg_mov(nfp_prog, dst, dst + 1);
959 		wrp_immed(nfp_prog, reg_both(dst + 1), 0);
960 	} else if (insn->imm > 32) {
961 		emit_shf(nfp_prog, reg_both(dst),
962 			 reg_none(), SHF_OP_NONE, reg_b(dst + 1),
963 			 SHF_SC_R_SHF, insn->imm - 32);
964 		wrp_immed(nfp_prog, reg_both(dst + 1), 0);
965 	}
966 
967 	return 0;
968 }
969 
970 static int mov_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
971 {
972 	const struct bpf_insn *insn = &meta->insn;
973 
974 	wrp_reg_mov(nfp_prog, insn->dst_reg * 2,  insn->src_reg * 2);
975 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
976 
977 	return 0;
978 }
979 
980 static int mov_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
981 {
982 	const struct bpf_insn *insn = &meta->insn;
983 
984 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2), insn->imm);
985 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
986 
987 	return 0;
988 }
989 
990 static int xor_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
991 {
992 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_XOR);
993 }
994 
995 static int xor_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
996 {
997 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_XOR, !~meta->insn.imm);
998 }
999 
1000 static int and_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1001 {
1002 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_AND);
1003 }
1004 
1005 static int and_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1006 {
1007 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_AND, !~meta->insn.imm);
1008 }
1009 
1010 static int or_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1011 {
1012 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_OR);
1013 }
1014 
1015 static int or_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1016 {
1017 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_OR, !meta->insn.imm);
1018 }
1019 
1020 static int add_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1021 {
1022 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_ADD);
1023 }
1024 
1025 static int add_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1026 {
1027 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_ADD, !meta->insn.imm);
1028 }
1029 
1030 static int sub_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1031 {
1032 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_SUB);
1033 }
1034 
1035 static int sub_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1036 {
1037 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_SUB, !meta->insn.imm);
1038 }
1039 
1040 static int shl_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1041 {
1042 	const struct bpf_insn *insn = &meta->insn;
1043 
1044 	if (!insn->imm)
1045 		return 1; /* TODO: zero shift means indirect */
1046 
1047 	emit_shf(nfp_prog, reg_both(insn->dst_reg * 2),
1048 		 reg_none(), SHF_OP_NONE, reg_b(insn->dst_reg * 2),
1049 		 SHF_SC_L_SHF, insn->imm);
1050 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
1051 
1052 	return 0;
1053 }
1054 
1055 static int end_reg32(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1056 {
1057 	const struct bpf_insn *insn = &meta->insn;
1058 	u8 gpr = insn->dst_reg * 2;
1059 
1060 	switch (insn->imm) {
1061 	case 16:
1062 		emit_ld_field(nfp_prog, reg_both(gpr), 0x9, reg_b(gpr),
1063 			      SHF_SC_R_ROT, 8);
1064 		emit_ld_field(nfp_prog, reg_both(gpr), 0xe, reg_a(gpr),
1065 			      SHF_SC_R_SHF, 16);
1066 
1067 		wrp_immed(nfp_prog, reg_both(gpr + 1), 0);
1068 		break;
1069 	case 32:
1070 		wrp_end32(nfp_prog, reg_a(gpr), gpr);
1071 		wrp_immed(nfp_prog, reg_both(gpr + 1), 0);
1072 		break;
1073 	case 64:
1074 		wrp_mov(nfp_prog, imm_a(nfp_prog), reg_b(gpr + 1));
1075 
1076 		wrp_end32(nfp_prog, reg_a(gpr), gpr + 1);
1077 		wrp_end32(nfp_prog, imm_a(nfp_prog), gpr);
1078 		break;
1079 	}
1080 
1081 	return 0;
1082 }
1083 
1084 static int imm_ld8_part2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1085 {
1086 	wrp_immed(nfp_prog, reg_both(nfp_meta_prev(meta)->insn.dst_reg * 2 + 1),
1087 		  meta->insn.imm);
1088 
1089 	return 0;
1090 }
1091 
1092 static int imm_ld8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1093 {
1094 	const struct bpf_insn *insn = &meta->insn;
1095 
1096 	meta->double_cb = imm_ld8_part2;
1097 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2), insn->imm);
1098 
1099 	return 0;
1100 }
1101 
1102 static int data_ld1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1103 {
1104 	return construct_data_ld(nfp_prog, meta->insn.imm, 1);
1105 }
1106 
1107 static int data_ld2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1108 {
1109 	return construct_data_ld(nfp_prog, meta->insn.imm, 2);
1110 }
1111 
1112 static int data_ld4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1113 {
1114 	return construct_data_ld(nfp_prog, meta->insn.imm, 4);
1115 }
1116 
1117 static int data_ind_ld1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1118 {
1119 	return construct_data_ind_ld(nfp_prog, meta->insn.imm,
1120 				     meta->insn.src_reg * 2, 1);
1121 }
1122 
1123 static int data_ind_ld2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1124 {
1125 	return construct_data_ind_ld(nfp_prog, meta->insn.imm,
1126 				     meta->insn.src_reg * 2, 2);
1127 }
1128 
1129 static int data_ind_ld4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1130 {
1131 	return construct_data_ind_ld(nfp_prog, meta->insn.imm,
1132 				     meta->insn.src_reg * 2, 4);
1133 }
1134 
1135 static int mem_ldx_skb(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1136 		       u8 size)
1137 {
1138 	swreg dst = reg_both(meta->insn.dst_reg * 2);
1139 
1140 	switch (meta->insn.off) {
1141 	case offsetof(struct sk_buff, len):
1142 		if (size != FIELD_SIZEOF(struct sk_buff, len))
1143 			return -EOPNOTSUPP;
1144 		wrp_mov(nfp_prog, dst, plen_reg(nfp_prog));
1145 		break;
1146 	case offsetof(struct sk_buff, data):
1147 		if (size != sizeof(void *))
1148 			return -EOPNOTSUPP;
1149 		wrp_mov(nfp_prog, dst, pptr_reg(nfp_prog));
1150 		break;
1151 	case offsetof(struct sk_buff, cb) +
1152 	     offsetof(struct bpf_skb_data_end, data_end):
1153 		if (size != sizeof(void *))
1154 			return -EOPNOTSUPP;
1155 		emit_alu(nfp_prog, dst,
1156 			 plen_reg(nfp_prog), ALU_OP_ADD, pptr_reg(nfp_prog));
1157 		break;
1158 	default:
1159 		return -EOPNOTSUPP;
1160 	}
1161 
1162 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
1163 
1164 	return 0;
1165 }
1166 
1167 static int mem_ldx_xdp(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1168 		       u8 size)
1169 {
1170 	swreg dst = reg_both(meta->insn.dst_reg * 2);
1171 
1172 	if (size != sizeof(void *))
1173 		return -EINVAL;
1174 
1175 	switch (meta->insn.off) {
1176 	case offsetof(struct xdp_buff, data):
1177 		wrp_mov(nfp_prog, dst, pptr_reg(nfp_prog));
1178 		break;
1179 	case offsetof(struct xdp_buff, data_end):
1180 		emit_alu(nfp_prog, dst,
1181 			 plen_reg(nfp_prog), ALU_OP_ADD, pptr_reg(nfp_prog));
1182 		break;
1183 	default:
1184 		return -EOPNOTSUPP;
1185 	}
1186 
1187 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
1188 
1189 	return 0;
1190 }
1191 
1192 static int
1193 mem_ldx_data(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1194 	     unsigned int size)
1195 {
1196 	swreg tmp_reg;
1197 
1198 	tmp_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
1199 
1200 	return data_ld_host_order(nfp_prog, meta->insn.src_reg * 2, tmp_reg,
1201 				  meta->insn.dst_reg * 2, size);
1202 }
1203 
1204 static int
1205 mem_ldx(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1206 	unsigned int size)
1207 {
1208 	if (meta->ptr.type == PTR_TO_CTX) {
1209 		if (nfp_prog->act == NN_ACT_XDP)
1210 			return mem_ldx_xdp(nfp_prog, meta, size);
1211 		else
1212 			return mem_ldx_skb(nfp_prog, meta, size);
1213 	}
1214 
1215 	if (meta->ptr.type == PTR_TO_PACKET)
1216 		return mem_ldx_data(nfp_prog, meta, size);
1217 
1218 	return -EOPNOTSUPP;
1219 }
1220 
1221 static int mem_ldx1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1222 {
1223 	return mem_ldx(nfp_prog, meta, 1);
1224 }
1225 
1226 static int mem_ldx2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1227 {
1228 	return mem_ldx(nfp_prog, meta, 2);
1229 }
1230 
1231 static int mem_ldx4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1232 {
1233 	return mem_ldx(nfp_prog, meta, 4);
1234 }
1235 
1236 static int mem_ldx8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1237 {
1238 	return mem_ldx(nfp_prog, meta, 8);
1239 }
1240 
1241 static int
1242 mem_st_data(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1243 	    unsigned int size)
1244 {
1245 	u64 imm = meta->insn.imm; /* sign extend */
1246 	swreg off_reg;
1247 
1248 	off_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
1249 
1250 	return data_st_host_order(nfp_prog, meta->insn.dst_reg * 2, off_reg,
1251 				  imm, size);
1252 }
1253 
1254 static int mem_st(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1255 		  unsigned int size)
1256 {
1257 	if (meta->ptr.type == PTR_TO_PACKET)
1258 		return mem_st_data(nfp_prog, meta, size);
1259 
1260 	return -EOPNOTSUPP;
1261 }
1262 
1263 static int mem_st1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1264 {
1265 	return mem_st(nfp_prog, meta, 1);
1266 }
1267 
1268 static int mem_st2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1269 {
1270 	return mem_st(nfp_prog, meta, 2);
1271 }
1272 
1273 static int mem_st4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1274 {
1275 	return mem_st(nfp_prog, meta, 4);
1276 }
1277 
1278 static int mem_st8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1279 {
1280 	return mem_st(nfp_prog, meta, 8);
1281 }
1282 
1283 static int
1284 mem_stx_data(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1285 	     unsigned int size)
1286 {
1287 	swreg off_reg;
1288 
1289 	off_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
1290 
1291 	return data_stx_host_order(nfp_prog, meta->insn.dst_reg * 2, off_reg,
1292 				   meta->insn.src_reg * 2, size);
1293 }
1294 
1295 static int
1296 mem_stx(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1297 	unsigned int size)
1298 {
1299 	if (meta->ptr.type == PTR_TO_PACKET)
1300 		return mem_stx_data(nfp_prog, meta, size);
1301 
1302 	return -EOPNOTSUPP;
1303 }
1304 
1305 static int mem_stx1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1306 {
1307 	return mem_stx(nfp_prog, meta, 1);
1308 }
1309 
1310 static int mem_stx2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1311 {
1312 	return mem_stx(nfp_prog, meta, 2);
1313 }
1314 
1315 static int mem_stx4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1316 {
1317 	return mem_stx(nfp_prog, meta, 4);
1318 }
1319 
1320 static int mem_stx8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1321 {
1322 	return mem_stx(nfp_prog, meta, 8);
1323 }
1324 
1325 static int jump(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1326 {
1327 	if (meta->insn.off < 0) /* TODO */
1328 		return -EOPNOTSUPP;
1329 	emit_br(nfp_prog, BR_UNC, meta->insn.off, 0);
1330 
1331 	return 0;
1332 }
1333 
1334 static int jeq_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1335 {
1336 	const struct bpf_insn *insn = &meta->insn;
1337 	u64 imm = insn->imm; /* sign extend */
1338 	swreg or1, or2, tmp_reg;
1339 
1340 	or1 = reg_a(insn->dst_reg * 2);
1341 	or2 = reg_b(insn->dst_reg * 2 + 1);
1342 
1343 	if (insn->off < 0) /* TODO */
1344 		return -EOPNOTSUPP;
1345 
1346 	if (imm & ~0U) {
1347 		tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
1348 		emit_alu(nfp_prog, imm_a(nfp_prog),
1349 			 reg_a(insn->dst_reg * 2), ALU_OP_XOR, tmp_reg);
1350 		or1 = imm_a(nfp_prog);
1351 	}
1352 
1353 	if (imm >> 32) {
1354 		tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
1355 		emit_alu(nfp_prog, imm_b(nfp_prog),
1356 			 reg_a(insn->dst_reg * 2 + 1), ALU_OP_XOR, tmp_reg);
1357 		or2 = imm_b(nfp_prog);
1358 	}
1359 
1360 	emit_alu(nfp_prog, reg_none(), or1, ALU_OP_OR, or2);
1361 	emit_br(nfp_prog, BR_BEQ, insn->off, 0);
1362 
1363 	return 0;
1364 }
1365 
1366 static int jgt_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1367 {
1368 	return wrp_cmp_imm(nfp_prog, meta, BR_BLO, true);
1369 }
1370 
1371 static int jge_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1372 {
1373 	return wrp_cmp_imm(nfp_prog, meta, BR_BHS, false);
1374 }
1375 
1376 static int jlt_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1377 {
1378 	return wrp_cmp_imm(nfp_prog, meta, BR_BLO, false);
1379 }
1380 
1381 static int jle_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1382 {
1383 	return wrp_cmp_imm(nfp_prog, meta, BR_BHS, true);
1384 }
1385 
1386 static int jset_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1387 {
1388 	const struct bpf_insn *insn = &meta->insn;
1389 	u64 imm = insn->imm; /* sign extend */
1390 	swreg tmp_reg;
1391 
1392 	if (insn->off < 0) /* TODO */
1393 		return -EOPNOTSUPP;
1394 
1395 	if (!imm) {
1396 		meta->skip = true;
1397 		return 0;
1398 	}
1399 
1400 	if (imm & ~0U) {
1401 		tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
1402 		emit_alu(nfp_prog, reg_none(),
1403 			 reg_a(insn->dst_reg * 2), ALU_OP_AND, tmp_reg);
1404 		emit_br(nfp_prog, BR_BNE, insn->off, 0);
1405 	}
1406 
1407 	if (imm >> 32) {
1408 		tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
1409 		emit_alu(nfp_prog, reg_none(),
1410 			 reg_a(insn->dst_reg * 2 + 1), ALU_OP_AND, tmp_reg);
1411 		emit_br(nfp_prog, BR_BNE, insn->off, 0);
1412 	}
1413 
1414 	return 0;
1415 }
1416 
1417 static int jne_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1418 {
1419 	const struct bpf_insn *insn = &meta->insn;
1420 	u64 imm = insn->imm; /* sign extend */
1421 	swreg tmp_reg;
1422 
1423 	if (insn->off < 0) /* TODO */
1424 		return -EOPNOTSUPP;
1425 
1426 	if (!imm) {
1427 		emit_alu(nfp_prog, reg_none(), reg_a(insn->dst_reg * 2),
1428 			 ALU_OP_OR, reg_b(insn->dst_reg * 2 + 1));
1429 		emit_br(nfp_prog, BR_BNE, insn->off, 0);
1430 		return 0;
1431 	}
1432 
1433 	tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
1434 	emit_alu(nfp_prog, reg_none(),
1435 		 reg_a(insn->dst_reg * 2), ALU_OP_XOR, tmp_reg);
1436 	emit_br(nfp_prog, BR_BNE, insn->off, 0);
1437 
1438 	tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
1439 	emit_alu(nfp_prog, reg_none(),
1440 		 reg_a(insn->dst_reg * 2 + 1), ALU_OP_XOR, tmp_reg);
1441 	emit_br(nfp_prog, BR_BNE, insn->off, 0);
1442 
1443 	return 0;
1444 }
1445 
1446 static int jeq_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1447 {
1448 	const struct bpf_insn *insn = &meta->insn;
1449 
1450 	if (insn->off < 0) /* TODO */
1451 		return -EOPNOTSUPP;
1452 
1453 	emit_alu(nfp_prog, imm_a(nfp_prog), reg_a(insn->dst_reg * 2),
1454 		 ALU_OP_XOR, reg_b(insn->src_reg * 2));
1455 	emit_alu(nfp_prog, imm_b(nfp_prog), reg_a(insn->dst_reg * 2 + 1),
1456 		 ALU_OP_XOR, reg_b(insn->src_reg * 2 + 1));
1457 	emit_alu(nfp_prog, reg_none(),
1458 		 imm_a(nfp_prog), ALU_OP_OR, imm_b(nfp_prog));
1459 	emit_br(nfp_prog, BR_BEQ, insn->off, 0);
1460 
1461 	return 0;
1462 }
1463 
1464 static int jgt_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1465 {
1466 	return wrp_cmp_reg(nfp_prog, meta, BR_BLO, true);
1467 }
1468 
1469 static int jge_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1470 {
1471 	return wrp_cmp_reg(nfp_prog, meta, BR_BHS, false);
1472 }
1473 
1474 static int jlt_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1475 {
1476 	return wrp_cmp_reg(nfp_prog, meta, BR_BLO, false);
1477 }
1478 
1479 static int jle_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1480 {
1481 	return wrp_cmp_reg(nfp_prog, meta, BR_BHS, true);
1482 }
1483 
1484 static int jset_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1485 {
1486 	return wrp_test_reg(nfp_prog, meta, ALU_OP_AND, BR_BNE);
1487 }
1488 
1489 static int jne_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1490 {
1491 	return wrp_test_reg(nfp_prog, meta, ALU_OP_XOR, BR_BNE);
1492 }
1493 
1494 static int goto_out(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1495 {
1496 	wrp_br_special(nfp_prog, BR_UNC, OP_BR_GO_OUT);
1497 
1498 	return 0;
1499 }
1500 
1501 static const instr_cb_t instr_cb[256] = {
1502 	[BPF_ALU64 | BPF_MOV | BPF_X] =	mov_reg64,
1503 	[BPF_ALU64 | BPF_MOV | BPF_K] =	mov_imm64,
1504 	[BPF_ALU64 | BPF_XOR | BPF_X] =	xor_reg64,
1505 	[BPF_ALU64 | BPF_XOR | BPF_K] =	xor_imm64,
1506 	[BPF_ALU64 | BPF_AND | BPF_X] =	and_reg64,
1507 	[BPF_ALU64 | BPF_AND | BPF_K] =	and_imm64,
1508 	[BPF_ALU64 | BPF_OR | BPF_X] =	or_reg64,
1509 	[BPF_ALU64 | BPF_OR | BPF_K] =	or_imm64,
1510 	[BPF_ALU64 | BPF_ADD | BPF_X] =	add_reg64,
1511 	[BPF_ALU64 | BPF_ADD | BPF_K] =	add_imm64,
1512 	[BPF_ALU64 | BPF_SUB | BPF_X] =	sub_reg64,
1513 	[BPF_ALU64 | BPF_SUB | BPF_K] =	sub_imm64,
1514 	[BPF_ALU64 | BPF_LSH | BPF_K] =	shl_imm64,
1515 	[BPF_ALU64 | BPF_RSH | BPF_K] =	shr_imm64,
1516 	[BPF_ALU | BPF_MOV | BPF_X] =	mov_reg,
1517 	[BPF_ALU | BPF_MOV | BPF_K] =	mov_imm,
1518 	[BPF_ALU | BPF_XOR | BPF_X] =	xor_reg,
1519 	[BPF_ALU | BPF_XOR | BPF_K] =	xor_imm,
1520 	[BPF_ALU | BPF_AND | BPF_X] =	and_reg,
1521 	[BPF_ALU | BPF_AND | BPF_K] =	and_imm,
1522 	[BPF_ALU | BPF_OR | BPF_X] =	or_reg,
1523 	[BPF_ALU | BPF_OR | BPF_K] =	or_imm,
1524 	[BPF_ALU | BPF_ADD | BPF_X] =	add_reg,
1525 	[BPF_ALU | BPF_ADD | BPF_K] =	add_imm,
1526 	[BPF_ALU | BPF_SUB | BPF_X] =	sub_reg,
1527 	[BPF_ALU | BPF_SUB | BPF_K] =	sub_imm,
1528 	[BPF_ALU | BPF_LSH | BPF_K] =	shl_imm,
1529 	[BPF_ALU | BPF_END | BPF_X] =	end_reg32,
1530 	[BPF_LD | BPF_IMM | BPF_DW] =	imm_ld8,
1531 	[BPF_LD | BPF_ABS | BPF_B] =	data_ld1,
1532 	[BPF_LD | BPF_ABS | BPF_H] =	data_ld2,
1533 	[BPF_LD | BPF_ABS | BPF_W] =	data_ld4,
1534 	[BPF_LD | BPF_IND | BPF_B] =	data_ind_ld1,
1535 	[BPF_LD | BPF_IND | BPF_H] =	data_ind_ld2,
1536 	[BPF_LD | BPF_IND | BPF_W] =	data_ind_ld4,
1537 	[BPF_LDX | BPF_MEM | BPF_B] =	mem_ldx1,
1538 	[BPF_LDX | BPF_MEM | BPF_H] =	mem_ldx2,
1539 	[BPF_LDX | BPF_MEM | BPF_W] =	mem_ldx4,
1540 	[BPF_LDX | BPF_MEM | BPF_DW] =	mem_ldx8,
1541 	[BPF_STX | BPF_MEM | BPF_B] =	mem_stx1,
1542 	[BPF_STX | BPF_MEM | BPF_H] =	mem_stx2,
1543 	[BPF_STX | BPF_MEM | BPF_W] =	mem_stx4,
1544 	[BPF_STX | BPF_MEM | BPF_DW] =	mem_stx8,
1545 	[BPF_ST | BPF_MEM | BPF_B] =	mem_st1,
1546 	[BPF_ST | BPF_MEM | BPF_H] =	mem_st2,
1547 	[BPF_ST | BPF_MEM | BPF_W] =	mem_st4,
1548 	[BPF_ST | BPF_MEM | BPF_DW] =	mem_st8,
1549 	[BPF_JMP | BPF_JA | BPF_K] =	jump,
1550 	[BPF_JMP | BPF_JEQ | BPF_K] =	jeq_imm,
1551 	[BPF_JMP | BPF_JGT | BPF_K] =	jgt_imm,
1552 	[BPF_JMP | BPF_JGE | BPF_K] =	jge_imm,
1553 	[BPF_JMP | BPF_JLT | BPF_K] =	jlt_imm,
1554 	[BPF_JMP | BPF_JLE | BPF_K] =	jle_imm,
1555 	[BPF_JMP | BPF_JSET | BPF_K] =	jset_imm,
1556 	[BPF_JMP | BPF_JNE | BPF_K] =	jne_imm,
1557 	[BPF_JMP | BPF_JEQ | BPF_X] =	jeq_reg,
1558 	[BPF_JMP | BPF_JGT | BPF_X] =	jgt_reg,
1559 	[BPF_JMP | BPF_JGE | BPF_X] =	jge_reg,
1560 	[BPF_JMP | BPF_JLT | BPF_X] =	jlt_reg,
1561 	[BPF_JMP | BPF_JLE | BPF_X] =	jle_reg,
1562 	[BPF_JMP | BPF_JSET | BPF_X] =	jset_reg,
1563 	[BPF_JMP | BPF_JNE | BPF_X] =	jne_reg,
1564 	[BPF_JMP | BPF_EXIT] =		goto_out,
1565 };
1566 
1567 /* --- Misc code --- */
1568 static void br_set_offset(u64 *instr, u16 offset)
1569 {
1570 	u16 addr_lo, addr_hi;
1571 
1572 	addr_lo = offset & (OP_BR_ADDR_LO >> __bf_shf(OP_BR_ADDR_LO));
1573 	addr_hi = offset != addr_lo;
1574 	*instr &= ~(OP_BR_ADDR_HI | OP_BR_ADDR_LO);
1575 	*instr |= FIELD_PREP(OP_BR_ADDR_HI, addr_hi);
1576 	*instr |= FIELD_PREP(OP_BR_ADDR_LO, addr_lo);
1577 }
1578 
1579 /* --- Assembler logic --- */
1580 static int nfp_fixup_branches(struct nfp_prog *nfp_prog)
1581 {
1582 	struct nfp_insn_meta *meta, *next;
1583 	u32 off, br_idx;
1584 	u32 idx;
1585 
1586 	nfp_for_each_insn_walk2(nfp_prog, meta, next) {
1587 		if (meta->skip)
1588 			continue;
1589 		if (BPF_CLASS(meta->insn.code) != BPF_JMP)
1590 			continue;
1591 
1592 		br_idx = nfp_prog_offset_to_index(nfp_prog, next->off) - 1;
1593 		if (!nfp_is_br(nfp_prog->prog[br_idx])) {
1594 			pr_err("Fixup found block not ending in branch %d %02x %016llx!!\n",
1595 			       br_idx, meta->insn.code, nfp_prog->prog[br_idx]);
1596 			return -ELOOP;
1597 		}
1598 		/* Leave special branches for later */
1599 		if (FIELD_GET(OP_BR_SPECIAL, nfp_prog->prog[br_idx]))
1600 			continue;
1601 
1602 		/* Find the target offset in assembler realm */
1603 		off = meta->insn.off;
1604 		if (!off) {
1605 			pr_err("Fixup found zero offset!!\n");
1606 			return -ELOOP;
1607 		}
1608 
1609 		while (off && nfp_meta_has_next(nfp_prog, next)) {
1610 			next = nfp_meta_next(next);
1611 			off--;
1612 		}
1613 		if (off) {
1614 			pr_err("Fixup found too large jump!! %d\n", off);
1615 			return -ELOOP;
1616 		}
1617 
1618 		if (next->skip) {
1619 			pr_err("Branch landing on removed instruction!!\n");
1620 			return -ELOOP;
1621 		}
1622 
1623 		for (idx = nfp_prog_offset_to_index(nfp_prog, meta->off);
1624 		     idx <= br_idx; idx++) {
1625 			if (!nfp_is_br(nfp_prog->prog[idx]))
1626 				continue;
1627 			br_set_offset(&nfp_prog->prog[idx], next->off);
1628 		}
1629 	}
1630 
1631 	/* Fixup 'goto out's separately, they can be scattered around */
1632 	for (br_idx = 0; br_idx < nfp_prog->prog_len; br_idx++) {
1633 		enum br_special special;
1634 
1635 		if ((nfp_prog->prog[br_idx] & OP_BR_BASE_MASK) != OP_BR_BASE)
1636 			continue;
1637 
1638 		special = FIELD_GET(OP_BR_SPECIAL, nfp_prog->prog[br_idx]);
1639 		switch (special) {
1640 		case OP_BR_NORMAL:
1641 			break;
1642 		case OP_BR_GO_OUT:
1643 			br_set_offset(&nfp_prog->prog[br_idx],
1644 				      nfp_prog->tgt_out);
1645 			break;
1646 		case OP_BR_GO_ABORT:
1647 			br_set_offset(&nfp_prog->prog[br_idx],
1648 				      nfp_prog->tgt_abort);
1649 			break;
1650 		}
1651 
1652 		nfp_prog->prog[br_idx] &= ~OP_BR_SPECIAL;
1653 	}
1654 
1655 	return 0;
1656 }
1657 
1658 static void nfp_intro(struct nfp_prog *nfp_prog)
1659 {
1660 	wrp_immed(nfp_prog, plen_reg(nfp_prog), GENMASK(13, 0));
1661 	emit_alu(nfp_prog, plen_reg(nfp_prog),
1662 		 plen_reg(nfp_prog), ALU_OP_AND, pv_len(nfp_prog));
1663 }
1664 
1665 static void nfp_outro_tc_legacy(struct nfp_prog *nfp_prog)
1666 {
1667 	const u8 act2code[] = {
1668 		[NN_ACT_TC_DROP]  = 0x22,
1669 		[NN_ACT_TC_REDIR] = 0x24
1670 	};
1671 	/* Target for aborts */
1672 	nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog);
1673 	wrp_immed(nfp_prog, reg_both(0), 0);
1674 
1675 	/* Target for normal exits */
1676 	nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog);
1677 	/* Legacy TC mode:
1678 	 *   0        0x11 -> pass,  count as stat0
1679 	 *  -1  drop  0x22 -> drop,  count as stat1
1680 	 *     redir  0x24 -> redir, count as stat1
1681 	 *  ife mark  0x21 -> pass,  count as stat1
1682 	 *  ife + tx  0x24 -> redir, count as stat1
1683 	 */
1684 	emit_br_byte_neq(nfp_prog, reg_b(0), 0xff, 0, nfp_prog->tgt_done, 2);
1685 	wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS);
1686 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x11), SHF_SC_L_SHF, 16);
1687 
1688 	emit_br(nfp_prog, BR_UNC, nfp_prog->tgt_done, 1);
1689 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(act2code[nfp_prog->act]),
1690 		      SHF_SC_L_SHF, 16);
1691 }
1692 
1693 static void nfp_outro_tc_da(struct nfp_prog *nfp_prog)
1694 {
1695 	/* TC direct-action mode:
1696 	 *   0,1   ok        NOT SUPPORTED[1]
1697 	 *   2   drop  0x22 -> drop,  count as stat1
1698 	 *   4,5 nuke  0x02 -> drop
1699 	 *   7  redir  0x44 -> redir, count as stat2
1700 	 *   * unspec  0x11 -> pass,  count as stat0
1701 	 *
1702 	 * [1] We can't support OK and RECLASSIFY because we can't tell TC
1703 	 *     the exact decision made.  We are forced to support UNSPEC
1704 	 *     to handle aborts so that's the only one we handle for passing
1705 	 *     packets up the stack.
1706 	 */
1707 	/* Target for aborts */
1708 	nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog);
1709 
1710 	emit_br_def(nfp_prog, nfp_prog->tgt_done, 2);
1711 
1712 	wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS);
1713 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x11), SHF_SC_L_SHF, 16);
1714 
1715 	/* Target for normal exits */
1716 	nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog);
1717 
1718 	/* if R0 > 7 jump to abort */
1719 	emit_alu(nfp_prog, reg_none(), reg_imm(7), ALU_OP_SUB, reg_b(0));
1720 	emit_br(nfp_prog, BR_BLO, nfp_prog->tgt_abort, 0);
1721 	wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS);
1722 
1723 	wrp_immed(nfp_prog, reg_b(2), 0x41221211);
1724 	wrp_immed(nfp_prog, reg_b(3), 0x41001211);
1725 
1726 	emit_shf(nfp_prog, reg_a(1),
1727 		 reg_none(), SHF_OP_NONE, reg_b(0), SHF_SC_L_SHF, 2);
1728 
1729 	emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0));
1730 	emit_shf(nfp_prog, reg_a(2),
1731 		 reg_imm(0xf), SHF_OP_AND, reg_b(2), SHF_SC_R_SHF, 0);
1732 
1733 	emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0));
1734 	emit_shf(nfp_prog, reg_b(2),
1735 		 reg_imm(0xf), SHF_OP_AND, reg_b(3), SHF_SC_R_SHF, 0);
1736 
1737 	emit_br_def(nfp_prog, nfp_prog->tgt_done, 2);
1738 
1739 	emit_shf(nfp_prog, reg_b(2),
1740 		 reg_a(2), SHF_OP_OR, reg_b(2), SHF_SC_L_SHF, 4);
1741 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_b(2), SHF_SC_L_SHF, 16);
1742 }
1743 
1744 static void nfp_outro_xdp(struct nfp_prog *nfp_prog)
1745 {
1746 	/* XDP return codes:
1747 	 *   0 aborted  0x82 -> drop,  count as stat3
1748 	 *   1    drop  0x22 -> drop,  count as stat1
1749 	 *   2    pass  0x11 -> pass,  count as stat0
1750 	 *   3      tx  0x44 -> redir, count as stat2
1751 	 *   * unknown  0x82 -> drop,  count as stat3
1752 	 */
1753 	/* Target for aborts */
1754 	nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog);
1755 
1756 	emit_br_def(nfp_prog, nfp_prog->tgt_done, 2);
1757 
1758 	wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS);
1759 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x82), SHF_SC_L_SHF, 16);
1760 
1761 	/* Target for normal exits */
1762 	nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog);
1763 
1764 	/* if R0 > 3 jump to abort */
1765 	emit_alu(nfp_prog, reg_none(), reg_imm(3), ALU_OP_SUB, reg_b(0));
1766 	emit_br(nfp_prog, BR_BLO, nfp_prog->tgt_abort, 0);
1767 
1768 	wrp_immed(nfp_prog, reg_b(2), 0x44112282);
1769 
1770 	emit_shf(nfp_prog, reg_a(1),
1771 		 reg_none(), SHF_OP_NONE, reg_b(0), SHF_SC_L_SHF, 3);
1772 
1773 	emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0));
1774 	emit_shf(nfp_prog, reg_b(2),
1775 		 reg_imm(0xff), SHF_OP_AND, reg_b(2), SHF_SC_R_SHF, 0);
1776 
1777 	emit_br_def(nfp_prog, nfp_prog->tgt_done, 2);
1778 
1779 	wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS);
1780 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_b(2), SHF_SC_L_SHF, 16);
1781 }
1782 
1783 static void nfp_outro(struct nfp_prog *nfp_prog)
1784 {
1785 	switch (nfp_prog->act) {
1786 	case NN_ACT_DIRECT:
1787 		nfp_outro_tc_da(nfp_prog);
1788 		break;
1789 	case NN_ACT_TC_DROP:
1790 	case NN_ACT_TC_REDIR:
1791 		nfp_outro_tc_legacy(nfp_prog);
1792 		break;
1793 	case NN_ACT_XDP:
1794 		nfp_outro_xdp(nfp_prog);
1795 		break;
1796 	}
1797 }
1798 
1799 static int nfp_translate(struct nfp_prog *nfp_prog)
1800 {
1801 	struct nfp_insn_meta *meta;
1802 	int i, err;
1803 
1804 	nfp_intro(nfp_prog);
1805 	if (nfp_prog->error)
1806 		return nfp_prog->error;
1807 
1808 	list_for_each_entry(meta, &nfp_prog->insns, l) {
1809 		instr_cb_t cb = instr_cb[meta->insn.code];
1810 
1811 		meta->off = nfp_prog_current_offset(nfp_prog);
1812 
1813 		if (meta->skip) {
1814 			nfp_prog->n_translated++;
1815 			continue;
1816 		}
1817 
1818 		if (nfp_meta_has_prev(nfp_prog, meta) &&
1819 		    nfp_meta_prev(meta)->double_cb)
1820 			cb = nfp_meta_prev(meta)->double_cb;
1821 		if (!cb)
1822 			return -ENOENT;
1823 		err = cb(nfp_prog, meta);
1824 		if (err)
1825 			return err;
1826 
1827 		nfp_prog->n_translated++;
1828 	}
1829 
1830 	nfp_outro(nfp_prog);
1831 	if (nfp_prog->error)
1832 		return nfp_prog->error;
1833 
1834 	for (i = 0; i < NFP_USTORE_PREFETCH_WINDOW; i++)
1835 		emit_nop(nfp_prog);
1836 	if (nfp_prog->error)
1837 		return nfp_prog->error;
1838 
1839 	return nfp_fixup_branches(nfp_prog);
1840 }
1841 
1842 static int
1843 nfp_prog_prepare(struct nfp_prog *nfp_prog, const struct bpf_insn *prog,
1844 		 unsigned int cnt)
1845 {
1846 	unsigned int i;
1847 
1848 	for (i = 0; i < cnt; i++) {
1849 		struct nfp_insn_meta *meta;
1850 
1851 		meta = kzalloc(sizeof(*meta), GFP_KERNEL);
1852 		if (!meta)
1853 			return -ENOMEM;
1854 
1855 		meta->insn = prog[i];
1856 		meta->n = i;
1857 
1858 		list_add_tail(&meta->l, &nfp_prog->insns);
1859 	}
1860 
1861 	return 0;
1862 }
1863 
1864 /* --- Optimizations --- */
1865 static void nfp_bpf_opt_reg_init(struct nfp_prog *nfp_prog)
1866 {
1867 	struct nfp_insn_meta *meta;
1868 
1869 	list_for_each_entry(meta, &nfp_prog->insns, l) {
1870 		struct bpf_insn insn = meta->insn;
1871 
1872 		/* Programs converted from cBPF start with register xoring */
1873 		if (insn.code == (BPF_ALU64 | BPF_XOR | BPF_X) &&
1874 		    insn.src_reg == insn.dst_reg)
1875 			continue;
1876 
1877 		/* Programs start with R6 = R1 but we ignore the skb pointer */
1878 		if (insn.code == (BPF_ALU64 | BPF_MOV | BPF_X) &&
1879 		    insn.src_reg == 1 && insn.dst_reg == 6)
1880 			meta->skip = true;
1881 
1882 		/* Return as soon as something doesn't match */
1883 		if (!meta->skip)
1884 			return;
1885 	}
1886 }
1887 
1888 /* Remove masking after load since our load guarantees this is not needed */
1889 static void nfp_bpf_opt_ld_mask(struct nfp_prog *nfp_prog)
1890 {
1891 	struct nfp_insn_meta *meta1, *meta2;
1892 	const s32 exp_mask[] = {
1893 		[BPF_B] = 0x000000ffU,
1894 		[BPF_H] = 0x0000ffffU,
1895 		[BPF_W] = 0xffffffffU,
1896 	};
1897 
1898 	nfp_for_each_insn_walk2(nfp_prog, meta1, meta2) {
1899 		struct bpf_insn insn, next;
1900 
1901 		insn = meta1->insn;
1902 		next = meta2->insn;
1903 
1904 		if (BPF_CLASS(insn.code) != BPF_LD)
1905 			continue;
1906 		if (BPF_MODE(insn.code) != BPF_ABS &&
1907 		    BPF_MODE(insn.code) != BPF_IND)
1908 			continue;
1909 
1910 		if (next.code != (BPF_ALU64 | BPF_AND | BPF_K))
1911 			continue;
1912 
1913 		if (!exp_mask[BPF_SIZE(insn.code)])
1914 			continue;
1915 		if (exp_mask[BPF_SIZE(insn.code)] != next.imm)
1916 			continue;
1917 
1918 		if (next.src_reg || next.dst_reg)
1919 			continue;
1920 
1921 		meta2->skip = true;
1922 	}
1923 }
1924 
1925 static void nfp_bpf_opt_ld_shift(struct nfp_prog *nfp_prog)
1926 {
1927 	struct nfp_insn_meta *meta1, *meta2, *meta3;
1928 
1929 	nfp_for_each_insn_walk3(nfp_prog, meta1, meta2, meta3) {
1930 		struct bpf_insn insn, next1, next2;
1931 
1932 		insn = meta1->insn;
1933 		next1 = meta2->insn;
1934 		next2 = meta3->insn;
1935 
1936 		if (BPF_CLASS(insn.code) != BPF_LD)
1937 			continue;
1938 		if (BPF_MODE(insn.code) != BPF_ABS &&
1939 		    BPF_MODE(insn.code) != BPF_IND)
1940 			continue;
1941 		if (BPF_SIZE(insn.code) != BPF_W)
1942 			continue;
1943 
1944 		if (!(next1.code == (BPF_LSH | BPF_K | BPF_ALU64) &&
1945 		      next2.code == (BPF_RSH | BPF_K | BPF_ALU64)) &&
1946 		    !(next1.code == (BPF_RSH | BPF_K | BPF_ALU64) &&
1947 		      next2.code == (BPF_LSH | BPF_K | BPF_ALU64)))
1948 			continue;
1949 
1950 		if (next1.src_reg || next1.dst_reg ||
1951 		    next2.src_reg || next2.dst_reg)
1952 			continue;
1953 
1954 		if (next1.imm != 0x20 || next2.imm != 0x20)
1955 			continue;
1956 
1957 		meta2->skip = true;
1958 		meta3->skip = true;
1959 	}
1960 }
1961 
1962 static int nfp_bpf_optimize(struct nfp_prog *nfp_prog)
1963 {
1964 	nfp_bpf_opt_reg_init(nfp_prog);
1965 
1966 	nfp_bpf_opt_ld_mask(nfp_prog);
1967 	nfp_bpf_opt_ld_shift(nfp_prog);
1968 
1969 	return 0;
1970 }
1971 
1972 static int nfp_bpf_ustore_calc(struct nfp_prog *nfp_prog, __le64 *ustore)
1973 {
1974 	int i;
1975 
1976 	for (i = 0; i < nfp_prog->prog_len; i++) {
1977 		int err;
1978 
1979 		err = nfp_ustore_check_valid_no_ecc(nfp_prog->prog[i]);
1980 		if (err)
1981 			return err;
1982 
1983 		nfp_prog->prog[i] = nfp_ustore_calc_ecc_insn(nfp_prog->prog[i]);
1984 
1985 		ustore[i] = cpu_to_le64(nfp_prog->prog[i]);
1986 	}
1987 
1988 	return 0;
1989 }
1990 
1991 /**
1992  * nfp_bpf_jit() - translate BPF code into NFP assembly
1993  * @filter:	kernel BPF filter struct
1994  * @prog_mem:	memory to store assembler instructions
1995  * @act:	action attached to this eBPF program
1996  * @prog_start:	offset of the first instruction when loaded
1997  * @prog_done:	where to jump on exit
1998  * @prog_sz:	size of @prog_mem in instructions
1999  * @res:	achieved parameters of translation results
2000  */
2001 int
2002 nfp_bpf_jit(struct bpf_prog *filter, void *prog_mem,
2003 	    enum nfp_bpf_action_type act,
2004 	    unsigned int prog_start, unsigned int prog_done,
2005 	    unsigned int prog_sz, struct nfp_bpf_result *res)
2006 {
2007 	struct nfp_prog *nfp_prog;
2008 	int ret;
2009 
2010 	nfp_prog = kzalloc(sizeof(*nfp_prog), GFP_KERNEL);
2011 	if (!nfp_prog)
2012 		return -ENOMEM;
2013 
2014 	INIT_LIST_HEAD(&nfp_prog->insns);
2015 	nfp_prog->act = act;
2016 	nfp_prog->start_off = prog_start;
2017 	nfp_prog->tgt_done = prog_done;
2018 
2019 	ret = nfp_prog_prepare(nfp_prog, filter->insnsi, filter->len);
2020 	if (ret)
2021 		goto out;
2022 
2023 	ret = nfp_prog_verify(nfp_prog, filter);
2024 	if (ret)
2025 		goto out;
2026 
2027 	ret = nfp_bpf_optimize(nfp_prog);
2028 	if (ret)
2029 		goto out;
2030 
2031 	nfp_prog->num_regs = MAX_BPF_REG;
2032 	nfp_prog->regs_per_thread = 32;
2033 
2034 	nfp_prog->prog = prog_mem;
2035 	nfp_prog->__prog_alloc_len = prog_sz;
2036 
2037 	ret = nfp_translate(nfp_prog);
2038 	if (ret) {
2039 		pr_err("Translation failed with error %d (translated: %u)\n",
2040 		       ret, nfp_prog->n_translated);
2041 		ret = -EINVAL;
2042 		goto out;
2043 	}
2044 
2045 	ret = nfp_bpf_ustore_calc(nfp_prog, (__force __le64 *)prog_mem);
2046 
2047 	res->n_instr = nfp_prog->prog_len;
2048 	res->dense_mode = false;
2049 out:
2050 	nfp_prog_free(nfp_prog);
2051 
2052 	return ret;
2053 }
2054